4 - Case Study On A Risk-Based Approach To Validation - For Review
4 - Case Study On A Risk-Based Approach To Validation - For Review
Charlie Wakeham
ISPE Philippines Conference April 2015
– 4. Validation
4.1 The validation documentation and reports should cover the
relevant steps of the life cycle. Manufacturers should be able to
justify their standards, protocols, acceptance criteria, procedures and
records based on their risk assessment.
– 6. Accuracy Checks
For critical data entered manually, there should be an additional
check on the accuracy of the data. This check may be done by a
second operator or by validated electronic means. The criticality and
the potential consequences of erroneous or incorrectly entered data
to a system should be covered by risk management.
1. Identify system
2. Produce URS
3. Determine validation strategy
• Risk Assessment
An initial Risk Assessment should be carried out during validation
planning. Further assessments should be performed as specifications
are developed.
• Assessment of system components
System components should be assessed and categorized to determine
the validation approach required. The output from this assessment
will feed into the Validation Plan.
• Supplier assessment
Suppliers should be formally assessed as part of the process of
selecting a supplier and planning for validation. The decision whether
to perform a Supplier Audit should be documented and based on a
Risk Assessment and categorization of the system components…
©2015 Waters Corporation 11
The recommended
approach to validation
is to test all functions
in the system equally
Data
Integrity
Product
Quality
Patient
Safety
The Customer
MUST decide the high, medium, low ratings for each
requirement
Has final responsibility for compliance (under law)
Has to defend the risk assessment and validation approach
during an inspection
Customer X is
implementing a Processing
Clients
networked
chromatography data
system in their QC lab.
It will store all of their Database
HPLC/MS data from Server
the lab.
Acquisition
Clients
HPLCs / MS
Limits &
boundaries
High Risk tested?
Risk Priority
Assessment Covered in
Create test in
standard
customized
testing
Medium Risk OQ
Priority
Risk Assessment
Project leader
System owner
Department manager
System users
IT representative
Quality representative
Vendor representative
Validation Subject Matter Expert
Note: this customer only wanted URS to testing documents mapped in their TM.
Normally it would also include DCS and FS (if available).
Risk Assessment
Test Plan
Traceability Matrix
The examples given here are from a real Waters customer. The
customer engaged Waters to execute the complete validation
life cycle in cooperation with the customer’s end users and
system administrator.
This customer was recently inspected by US FDA, who had no
observations on this validation of their Empower Enterprise
system
A Risk-Based Approach is desired and encouraged by the
regulators
It focuses effort where it’s needed
It makes testing of a complex system manageable
Probability of
Occurrence
Likelihood of
Detection
Risk Priority
(overall rating)